• Home
  • Cyber Crime
  • Cyber warfare
  • APT
  • Data Breach
  • Deep Web
  • Digital ID
  • Hacking
  • Hacktivism
  • Intelligence
  • Internet of Things
  • Laws and regulations
  • Malware
  • Mobile
  • Reports
  • Security
  • Social Networks
  • Terrorism
  • ICS-SCADA
  • EXTENDED COOKIE POLICY
  • Contact me

Must Read

  • Clop ransomware gang leaks data allegedly stolen from cybersecurity firm Qualys
  • The Ursnif Trojan has hit over 100 Italian banks
  • Cyber Defense Magazine – March 2021 has arrived. Enjoy it!
  • Bug bounty hunter awarded $50,000 for a Microsoft account hijack flaw
  • Attackers took over the Perl.com domain in September 2020
  • Four zero-days in Microsoft Exchange actively exploited in the wild
  • Home
  • Cyber Crime
  • Cyber warfare
  • APT
  • Data Breach
  • Deep Web
  • Digital ID
  • Hacking
  • Hacktivism
  • Intelligence
  • Internet of Things
  • Laws and regulations
  • Malware
  • Mobile
  • Reports
  • Security
  • Social Networks
  • Terrorism
  • ICS-SCADA
  • EXTENDED COOKIE POLICY
  • Contact me

Home Archive by category Hacking (Page 611)

Hacking

Has Anonymous infiltrated US Government? The insider issue

In last months we have a long discussed about the security status of US networks and infrastructures, we have described the American cyber strategies and the main action proposed to protect the principal assets of the nations. One story in particular...

May 16, 2012  By Pierluigi Paganini   Posted In  Cyber Crime  Cyber warfare  Hacking  Intelligence  Security 

NFC, business opportunities, security and privacy issues

The NFC technology Near field communication (NFC) is a set of standards for Smartphones and similar devices to establish radio communication with each other by touching them together or bringing them into close proximity. The standard describes...

May 9, 2012  By Pierluigi Paganini   Posted In  Hacking  Security 

They are Not What You Think They are … They are Hacktivists

Article Published on The Hacker New Magazine – May Edition “They are Not What You Think they Are … they are hacktivists" During the last couple of years, we have witnessed the escalation of operations conducted by the Anonymous group, the collective...

May 6, 2012  By Pierluigi Paganini   Posted In  Cyber Crime  Hacking  Security 

Anonymous Reloaded. Yesterday, today, tomorrow

The word "Anonymous " evokes the myth of the hacker in today's society that defends freedom of expression and agrees with sensational cyber operations in the fight against censorship and government and industrial questionable policies. If Anonymous is perceived...

May 4, 2012  By Pierluigi Paganini   Posted In  Cyber Crime  Hacking  Security 

Google used as cyber weapon. New attack method found

True, sometimes the big discoveries are the daughters of the case. That's what happened to Panos Ipeirotis, a researcher of the New York University, he has discovered a new technique of attack on his Amazon web service using Google Spreadsheets. The methods...

April 29, 2012  By Pierluigi Paganini   Posted In  Hacking  Security 

Stuxnet & Duqu, update on cyber weapons usage

We all know about the malware Stuxnet and Duqu considered unanimously the first examples of cyber weapon developed by a government to silent attacks critical enemy infrastructures. We have written a lot on the topic, we have followed with attention the excellent...

April 19, 2012  By Pierluigi Paganini   Posted In  Cyber warfare  Hacking  Intelligence  Malware  Security 

Walk trough the penetration testing fundamentals

The article is published on the last edition of Pentest Magazine. Enjoy the reading, the magazine is free and to download it you just have to create a free account on www.pentestmag.com. Talking about penetration testing fundamentals and their introduction...

April 18, 2012  By Pierluigi Paganini   Posted In  Cyber warfare  Hacking  Security 

Iran, 3M bank accounts hacked.Hypothesis on cyber warfare scenario

The story that I desire to report seems the plot of a movie, Khosrow Zarefarid an Iranian software manager after finding security vulnerability in Iran’s banking system tried to inform the management of the affected banks preparing a detailed report. As...

April 17, 2012  By Pierluigi Paganini   Posted In  Cyber Crime  Cyber warfare  Hacking  Security 

DDoS, detailed analysis of the phenomenon

Last year we have observer an impressive grow of distributed denial-of-service (DDoS) attacks mainly related to operation arranged by group of hacktivists such as Anonymous. During a DDoS attacks multitude of compromised systems attack a single target...

April 16, 2012  By Pierluigi Paganini   Posted In  Cyber Crime  Hacking  Security 

Medicaid incident. How much cost a data breach?

The Utah Department of Technology Services (DTS) has announced that the Utah Department of Health (UDOH) was victim of an hack. On Monday the server that hosts Medicaid was hacked, the news of the breach has been published on Wednesday. In a first time...

April 11, 2012  By Pierluigi Paganini   Posted In  Cyber Crime  Hacking  Malware  Security 


« First‹ Previous607608609610611612613614615Next ›Last »
Page 611 of 619



Copyright 2021 Security Affairs by Pierluigi Paganini All Right Reserved.
Back to top
  • Home
  • Cyber Crime
  • Cyber warfare
  • APT
  • Data Breach
  • Deep Web
  • Digital ID
  • Hacking
  • Hacktivism
  • Intelligence
  • Internet of Things
  • Laws and regulations
  • Malware
  • Mobile
  • Reports
  • Security
  • Social Networks
  • Terrorism
  • ICS-SCADA
  • EXTENDED COOKIE POLICY
  • Contact me
This site uses cookies, including for analytics, personalization, and advertising purposes. For more information or to change your cookie settings, click here.

If you continue to browse this site without changing your cookie settings, you agree to this use.
Accept Read More
Privacy and Cookies Policy

Privacy Overview

This website uses cookies to improve your experience while you navigate through the website. Out of these cookies, the cookies that are categorized as necessary are stored on your browser as they are essential for the working of basic functionalities of the website. We also use third-party cookies that help us analyze and understand how you use this website. These cookies will be stored in your browser only with your consent. You also have the option to opt-out of these cookies. But opting out of some of these cookies may have an effect on your browsing experience.
Necessary
Always Enabled

Necessary cookies are absolutely essential for the website to function properly. This category only includes cookies that ensures basic functionalities and security features of the website. These cookies do not store any personal information.

Non-necessary

Any cookies that may not be particularly necessary for the website to function and is used specifically to collect user personal data via analytics, ads, other embedded contents are termed as non-necessary cookies. It is mandatory to procure user consent prior to running these cookies on your website.

SAVE & ACCEPT